Business email compromise (BEC) is an effective cyberattack that uses deception and impersonation to steal large sums of money from organizations. If an organization relies on wire transfers to make or receive payments then, sooner or later, it will be targeted. Furthermore, successful BEC attacks are financially devastating with losses regularly exceeding $100,000. Though there […]

Meet the Team Employee Spotlight: Eric Vanderburg Title: Vice President, Cybersecurity Location: Cleveland, OH What is the most rewarding part of the job? I love the satisfaction of a job well done, and we get the chance to work on many interesting projects. Clients come with unique scenarios, and we put together an innovative cybersecurity [...]January 3, 2019 |

Meet the Team Employee Spotlight: Nancy Cipriani Title: Senior Project Director Location: Greensboro, NC Nancy Cipriani is a self-described Midwestern girl. Born and raised in Missouri, she graduated from the University of Central Missouri with a degree in Business Administration. It was after college, while working at a local law firm, that Nancy made an impression […]

Meet the Team Employee Spotlight: Joe Anguilano Title: Managing Director of Cybersecurity Location: Cleveland, OH How did you start at the company? In 2005, I was hired by JURINNOV (acquired by TCDI in 2016) as an intern during my senior year at John Carroll University. Upon graduation, I was brought on full-time as a Business Analyst. One [...]November 12, 2018 |

"There are risks and costs to a program of action - but they are far less than the long range cost of comfortable inaction." - John F. Kennedy 1. Have a written incident response plan and practice it on a regular basis. Time is of the essence when responding to a data breach. Every second [...]August 23, 2018 |
Tim Opsitnick

Bill Gates once said that “technology is just a tool. In terms of getting the kids working together and motivating them, the teacher is the most important.” If we think about that quote in terms of technology assisted review (TAR), the quote makes total sense. Members of my dev team and I were talking yesterday […]

We were at the ACC Legal Operations conference this week in Chicago, and once again Legal Spend Analytics (LSA) was a big topic of discussion. Attendees were from both large and small legal departments, and the issue exists for all of them. Am I doing this as efficiently and inexpensively as possible? Although LSA is […]

The Importance of Cybersecurity Logging Logs are crucial elements to breach investigations. However, some investigations suffer from a lack of logs. In such cases, the company must assume the worst if no evidence can be brought to the contrary. This may require sending notifications to an entire customer base or paying large fines. Some of […]